1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataly_w [17]
3 years ago
9

All programs display a list of all the installed programs​

Computers and Technology
1 answer:
Viktor [21]3 years ago
4 0

Explanation:

<h3>HOPE IT WILL HELP YOU TO SOLVE YOUR PROBLEM.</h3>

You might be interested in
Help plz technological wuestion
Alex787 [66]
The first answer is the correct one
8 0
3 years ago
Which function of InfoSec management encompasses security personnel as well as aspects of the SETA program?
inessss [21]

Answer:

People

Explanation:

Information security management provides a description of the controls needed by an organization in order to ensure that it is capable of protecting the integrity, availability, and confidentiality of assets from security vulnerability and threats. On the other hand, the SETA program is three phased and ensures that organizations address and implement training and techniques for information security. Hence the only function that encompasses security personnel as well as aspects of the SETA program is the People function.

8 0
4 years ago
Which Internet protocol (IP) packet fragmentation header field specifies where the fragment belongs in the original datagram
Yanka [14]

An Internet protocol (IP) packet fragmentation header field which specifies where the fragment belongs in the original datagram is the fragment offset.

<h3>What is the TCP/IP model?</h3>

The TCP/IP model is known as the Internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model and it can be defined as a standard framework that is designed and developed for the transmission (prepare and forward) of information on the Internet.

In the TCP/IP model, a fragment offset simply refers to an Internet protocol (IP) packet fragmentation header field which is used to specify where the fragment belongs in the original datagram.

Read more on Internet protocol here: brainly.com/question/17387945

#SPJ1

8 0
2 years ago
Your recovery/recycling machine has r-502 refrigerant in it. you now have to recover refrigerant from a unit with r-22. what mus
zimovet [89]
Recover as much of the R-502 from the recovery unit as possible, change filter, and evacuate. In addition, to alter the compressor on a system containing R-410A, the person must isolate the compressor then evacuate the isolated section of the system to atmospheric pressure and hold. If system pressure does not increase, then remove the compressor. The recovered refrigerant may encompass acids, moisture and oils and every air conditioning or refrigerating system should be secure by a pressure relief device. 
5 0
3 years ago
A large retailer is asking each customer at checkout for their zip code. if the zip code is the only recorded variable, what is
Varvara68 [4.7K]

Answer:

Nominal

Explanation:

  • So while singing the question, let's further move to the answer. So let's see here and there.
  • The first option is B. S, which corrects gross sectional data, And the 2nd 1 of Nominal, C. Is correct nominal. So here are the buddha points which are given in the question.
  • The first one, option B is correct cross-sectional data, And the 2nd 1, is option C. Is correct nominal.

To learn more about it, refer

to brainly.com/question/25458754

#SPJ4

7 0
2 years ago
Other questions:
  • Consider the following code segment:
    5·1 answer
  • You want a class to have access to members ofanother class in the same package. Which is themost restrictive access that accompl
    11·1 answer
  • What is employee Internet management (EIM) software?
    5·2 answers
  • Linux implements _________ to determine how a user is to be authenticated and whether there are password policies associated wit
    11·1 answer
  • Which tab should you use to change the text font color in your presentation?
    15·1 answer
  • A ____ is a a set of presentation rules that control how text should look. It is applied to an XML file to change the collection
    9·1 answer
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers.
    8·1 answer
  • What is your definition of Digital Safety?
    6·1 answer
  • If a student ate 3/4 (three-fourths) of their meals away from home, what % of the total day is spent eating other than at home?
    11·1 answer
  • What are the common operations performed on character strings?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!